|
This certificate applies to software projects that are not externally distributed or have not yet declared a licence. It confirms that all third-party dependencies, including transitive ones, have been identified and externally verified for mutual licence compatibility, and for critical vulnerabilities. It is suitable for internal tools or services, unlicensed or unpublished code, and projects seeking external validation before choosing a licence. It also requires that other third-party intellectual property is reviewed and documented.
The certificate does not grant distribution rights or replace licence selection and compliance, as it does not assess the project’s own licensing. It builds upon the Self-Assessed Dependencies Certificate, providing stronger assurance of third-party legal and security risks by extending the scope to transitive dependencies and introducing verification by the Licence Management Team, after the software team has internally evaluated key points about dependencies, licences, and security, and prepared verification materials.
A full specification of software licensing certificates is also available for GÉANT participants.
Ensure your software project:
Has identified licences for all direct and transitive dependencies
Has confirmed that all dependency licences are mutually compatible for use in the software
NOTICE file)Is registered in the GÉANT Software Catalogue
Compile a comprehensive list of all direct and transitive third-party dependencies used in your software project. You may use a Software Composition Analysis (SCA) tool or the GÉANT SCA service.
Document licence and vulnerability information for each dependency. Having an internal list of all included third-party libraries and code is mandatory. It should list all third-party components, their versions, licences, and known vulnerabilities.
If the project contains multiple repositories, separately list dependencies for each component and its respective repository. Include all standalone modules developed for joint use, even if loosely coupled (for example, internal services).
Confirm that every dependency is under a valid open source or proprietary licence. Ensure that all dependency licences are mutually compatible for use in your software.
Manually review all other third-party intellectual property, including source code, components, content, designs, models, and similar assets. Identify, assess, and document their inclusion, as SCA tools may not detect them. These records may be included in the project’s NOTICE file with attribution or licence notices if required by their terms of use.
Address all critical vulnerabilities in dependencies, typically by upgrading to secure versions.
Resolve any known licence incompatibilities and instances of improper use of third-party intellectual property.
Prepare and make the following available to your team:
Optional README and NOTICE files
Consider preparing project artefacts containing dependency information (excluding vulnerability details; use available templates). Having these documents early makes the software more accessible and supports future licence declaration:
README – Optional, but useful to capture basic information about the software early; it is the starting point for documented and licensed softwareNOTICE – Optional, but required if legal notices or attributions for third-party components are mandated by dependency licencesConsult with the Licence Management Team if you need clarifications or support during preparation.
Send a request to the Licence Management Team, including:
README, NOTICE, or internal reports on dependencies, licences, and vulnerabilitiesRefer to Contact Us for instructions on communicating with the team.
Cooperate with the Licence Management Team to:
Upon approval, your project will receive the Verified Dependencies Certificate, visible at certificates.software.geant.org and in the GÉANT Software Catalogue.
Reference the certificate in documentation, metadata, project pages, or communications. The Licence Management Team will provide guidance on how to do this.
To keep the certificate valid:
Update documentation as needed.
If issues arise, your team may be asked to provide additional information, address identified licence or vulnerability issues, or update dependency records.
The certificate is valid for five years, covering all versions released within that period, provided vulnerabilities and licence incompatibilities are promptly addressed.
Reassess and submit a renewal request before the five-year validity period ends, or sooner if there are significant changes (e.g. component replacement or inclusion of a new component under a novel licence).
The certificate may be revoked if:
Integrate SCA scanning into the CI/CD pipeline to detect licence or vulnerability issues early, and maintain long-term compliance.